找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Computational Data and Social Networks; 11th International C Thang N. Dinh,Minming Li Conference proceedings 2023 The Editor(s) (if applica

[复制链接]
楼主: invoke
发表于 2025-3-28 16:56:58 | 显示全部楼层
The Influence of Color on Prices of Abstract Paintings a painting have on its price. We construct a number of visual features in CIELAB color space measuring complexity of the painting, its points of interest using Discrete symmetry transform, segmentation-based features using Felzenszwalb segmentation and Regions adjacency graph merging, local color f
发表于 2025-3-28 18:58:31 | 显示全部楼层
发表于 2025-3-29 02:39:21 | 显示全部楼层
Knowledge Transfer via Word Alignment and Its Application to Vietnamese POS Tagging Vietnamese. Due to the development and investment in research, there is no large and high-accuracy annotated corpus. This paper proposes a transfer learning strategy to build a high-quality tagger for Vietnamese using a bilingual corpus Vietnamese-English. Particularly, We inherit the strength of a
发表于 2025-3-29 03:43:25 | 显示全部楼层
发表于 2025-3-29 08:27:01 | 显示全部楼层
发表于 2025-3-29 12:11:53 | 显示全部楼层
Targeted Attack of the Air Transportation Network Global Componentven centrality measure. Although most real-world networks exhibit a mesoscopic structure, strategies proposed in the literature do not exploit this ubiquitous property. We introduce an attack strategy based on the network component structure to overcome these drawbacks. The component structure of a
发表于 2025-3-29 16:43:57 | 显示全部楼层
Measuring Cryptocurrency Mining in Public Cloud Services: A Security Perspectivety in cryptocurrencies is “mining pools”, groups of cooperating cryptocurrency miners who agree to share block rewards in proportion to their contributed mining hash power. Despite the many promised benefits of cryptocurrencies, they are equally utilized for malicious activities, e.g., ransomware pa
发表于 2025-3-29 22:28:11 | 显示全部楼层
Do Content Management Systems Impact the Security of Free Content Websites?1,500 websites with free and premium content, we identify their content management system (CMS) and malicious attributes. We use frequency analysis at both the aggregate and per category of content (books, games, movies, music, and software), utilizing the unpatched vulnerabilities, total vulnerabil
发表于 2025-3-30 02:53:18 | 显示全部楼层
BNnetXtreme: An Enhanced Methodology for Bangla Fake News Detection Onlineas there have been significant events in various cities due to unjustifiable rumors. But the overall progress in study and innovation in the detection of Bangla fake and misleading news is still not adequate in light of the prospects for policymakers in Bangladesh. In this study, an enhanced methodo
发表于 2025-3-30 07:37:33 | 显示全部楼层
Heuristic Gradient Optimization Approach to Controlling Susceptibility to Manipulation in Online Soceir interactions with the network. Since some users have a higher propensity for disclosure than others, a one-size-fits-all technique for limiting manipulation proves insufficient. In this work, we propose a model that allows the user to adjust their online persona to limit their susceptibility to
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-22 02:42
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表